It’s hard to believe that 2013 is halfway over. With time flying by so quickly, you probably haven’t been able to keep up with all the news of the last month. That’s why we’ve gathered the best System Administration, Hosting, Security, and Enterprise IT content from June in one convenient place. Enjoy and let us know what you think in the comment section below.
The Road to Success with Big Data: A Closer Look at Expectations vs. Reality – Big Data is complex. The technologies in Big Data are rapidly maturing, but are still in many ways in an adolescent phase. While Hadoop is dominating the charts for Big Data technologies, in the recent years we have seen a variety of technologies born out of the early starters in this space, such as Google, Yahoo, Facebook and Cloudera.
MongoDB Days 2013: Future of MongoDB is Looking Great for DevOps – In recent years, we have seen a growing interest in database management systems that differ from traditional relational model. Central to this is the concept of NoSQL, a term used to denote collectively software databases that do not use SQL (Structured Query Language) to interact with stored data.
9 Reasons Sys Admins Hate You – A lone admin recently drew attention to the power the humble system administrator wields when he made front page international news by leaking details about PRISM, an NSA electronic surveillance program. Of course, you probably already know that sys admins are the lifelines between your keyboard and productivity, so the last thing you want to do is get on their bad side.
NoSQL Concept and MongoDB – In recent years, we often hear the name of NoSQL as a new star that is rising in the world of IT and it has emerged as a different and alternative approach compared to relational database management systems (RDBMS).
A Developer’s dilemma: When to Use NoSQL – A NoSQL database provides a mechanism for storage and retrieval of data that uses looser consistency models than the traditional relational databases. NoSQL databases are normally highly optimized for retrieval and appending operations and most of these offer little functionality beyond record storage.
The Pros and Cons of Private and Public PaaS – I just returned from attending the Cloud Expo in New York City this week. The conference was dominated by private and hybrid cloud topics. There were several private Platform as a Service (PaaS) vendors attending whom I spent a great deal of time talking to as I walked the floor.
What Is the Software Defined Data Center and Why Is It Important? – In every emerging technology market, hype seems to wax and wane. One day a new technology is red hot, the next day it’s old hat. Sometimes the hype tends to pan out and concepts such as “e-commerce” become a normal way to shop.
Big Data – Big Help or Big Risk? – As promised in my last blog “Big Data, API, and IoT …… Newer technologies protected by older security” here is a deep dive on Big Data security and how to effortlessly secure Big Data effectively.
Enterprise Encryption Implementation Strategies – Last week I spoke about how IT impacts every aspect of business; today, our focus is on what fuels IT – Data. Data begets Information and Information fosters Knowledge, and Knowledge, as Francis Bacon put it so eloquently hundreds of years ago, is Power.
What Storage Might Look Like In Five Years – Once in a while, I get someone who challenges me to really think outside the box, and speculate what things might look like farther out beyond the typical 12-24 month horizon.
How to Compete When IT Is Abundant – “You only gain an edge over rivals by having or doing something that they can’t have or do,” wrote Nicholas Carr ten years ago in his controversial HBR article, “IT Doesn’t Matter.” Carr predicted that an organization’s ability to compete through investing in information technology was about to change dramatically.
Cisco Extends Catalyst Line Amid Enterprise Networking Product Refresh – Cisco Systems (CSCO) is riding its own wave in the software-defined networking (SDN) pool as it refreshes its entire enterprise networking line to meet the next level of enterprise needs.
Why Mobile Developers Are Really Starting To Embrace The Enterprise – Mobile in the enterprise is like crack. First, organizations got a little taste of it and liked the results. Now they crave more. And mobile developers are scrambling to hook them up. Unlike consumers, enterprises tend to sample addictive new technologies warily.
Should Web Hosts Always Remain Impartial? – The troubled pinballing of the Digital Economy Act 2010 around the UK’s judicial processes highlights some rather jumbled thoughts when it comes to the responsibility of service providers for digital content. On the one hand, those with legal rights to material traded over the internet are understandably keen to protect their work and tackle, in this case, copyright infringement.
Five Essential Webhosting Features Your Site Must Have – Launching your own website is a great way for businesses and individuals to get their products and opinions out to the greater world. A website can allow an individual to voice their opinions and thoughts in a venue that reaches far beyond their circle of friends, while it also allows a small business to reach customers in regions they cannot otherwise reach. Setting up and maintaining a website can be a lot more difficult than most think.
Organizations Must Defend Against Advanced Persistent Threats – New data security technology is available for organizations in every industry to defend against some of the modern threats that attack networks, but cybercriminals have new technology of their own that may be able to bypass companies that get left behind in the security game.
Infosec Risk Management: Art, Science or Philosophy? – In a recent survey on the state of risk based security management, we asked leading information security and risk management professionals in the US and UK a simple question: Is information security risk management an art or a science?
Five Big Questions About Big Data Encryption – A few months ago experts predicted 2013 would be the Year of Big Data. To a large extent, those predictions have been spot on, with Big Data investment on the rise and success stories emerging across a variety of industries from insurance to pharma to professional basketball.
Security Experts Struggle to Solve Access Conundrum – Finding the balance between the needs of the business and its regulatory requirements is an ongoing challenge. Balancing the business need for network and application access with security and regulatory requirements continues to be one of the key challenges for information security professionals.
In honor of the ballpoint pen’s 75th anniversary in June, we’ll leave you this month with a time lapse video that shows Gollum being drawn using only a ballpoint pen.